A Survey on Tor Encrypted Traffic Monitoring

被引:0
|
作者
Aminuddin, Mohamad Amar Irsyad Mohd [1 ]
Zaaba, Zarul Fitri [1 ]
Singh, Manmeet Kaur Mahinderjit [1 ]
Singh, Darshan Singh Mahinder [2 ]
机构
[1] Univ Sains Malaysia, Sch Comp Sci, Usm 11800, Pulau Pinang, Malaysia
[2] Univ Sains Malaysia, Sch Comp Sci, Ctr Drug Res, Usm 11800, Pulau Pinang, Malaysia
关键词
Encrypted traffic monitoring; Tor; machine learning; security; survey;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Tor (The Onion Router) is an anonymity tool that is widely used worldwide. Tor protect its user privacy against surveillance and censorship using strong encryption and obfuscation techniques which makes it extremely difficult to monitor and identify users' activity on the Tor network. It also implements strong defense to protect the users against traffic features extraction and website fingerprinting. However, the strong anonymity also became the heaven for criminal to avoid network tracing. Therefore, numerous of research has been performed on encrypted traffic analyzing and classification using machine learning techniques. This paper presents survey on existing approaches for classification of Tor and other encrypted traffic. There is preliminary discussion on machine learning approaches and Tor network. Next, there are comparison of the surveyed traffic classification and discussion on their classification properties.
引用
收藏
页码:113 / 120
页数:8
相关论文
共 50 条
  • [1] Tor Traffic Classification Based on Encrypted Payload Characteristics
    Choorod, Pitpimon
    Weir, George
    2021 IEEE NATIONAL COMPUTING COLLEGES CONFERENCE (NCCC 2021), 2021, : 1107 - +
  • [2] A Survey on Encrypted Traffic Classification
    Cao, Zigang
    Xiong, Gang
    Zhao, Yong
    Li, Zhenzhen
    Guo, Li
    APPLICATIONS AND TECHNIQUES IN INFORMATION SECURITY, ATIS 2014, 2014, 490 : 73 - 81
  • [3] Classifying Tor Traffic Encrypted Payload Using Machine Learning
    Choorod, Pitpimon
    Weir, George
    Fernando, Anil
    IEEE ACCESS, 2024, 12 : 19418 - 19431
  • [4] A survey of methods for encrypted traffic classification and analysis
    Velan, Petr
    Cermak, Milan
    Celeda, Pavel
    Drasar, Martin
    INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT, 2015, 25 (05) : 355 - 374
  • [5] Detection and Countermeasure of Encrypted Malicious Traffic: A Survey
    Hou J.
    Lu H.
    Liu F.-A.
    Wang X.-W.
    Tian Z.-H.
    Ruan Jian Xue Bao/Journal of Software, 2024, 35 (01): : 333 - 355
  • [6] Survey: Intrusion Detection Systems in Encrypted Traffic
    Kovanen, Tiina
    David, Gil
    Hamalainen, Timo
    INTERNET OF THINGS, SMART SPACES, AND NEXT GENERATION NETWORKS AND SYSTEMS, NEW2AN 2016/USMART 2016, 2016, 9870 : 281 - 293
  • [7] A survey of methods for encrypted network traffic fingerprinting
    Yu, Sunghyun
    Won, Yoojae
    MATHEMATICAL BIOSCIENCES AND ENGINEERING, 2023, 20 (02) : 2183 - 2202
  • [8] A survey on analyzing encrypted network traffic of mobile devices
    Ankit Agrawal
    Ashutosh Bhatia
    Ayush Bahuguna
    Kamlesh Tiwari
    K. Haribabu
    Deepak Vishwakarma
    Rekha Kaushik
    International Journal of Information Security, 2022, 21 : 873 - 915
  • [9] A survey on analyzing encrypted network traffic of mobile devices
    Agrawal, Ankit
    Bhatia, Ashutosh
    Bahuguna, Ayush
    Tiwari, Kamlesh
    Haribabu, K.
    Vishwakarma, Deepak
    Kaushik, Rekha
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2022, 21 (04) : 873 - 915
  • [10] A Survey on Encrypted Network Traffic Analysis Applications, Techniques, and Countermeasures
    Papadogiannaki, Eva
    Ioannidis, Sotiris
    ACM COMPUTING SURVEYS, 2021, 54 (06)